Page 5 of 198 results (0.019 seconds)

CVSS: 8.2EPSS: 0%CPEs: 2EXPL: 1

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. ... Loading from a local driver was correctly prevented. • https://github.com/pinpinsec/CVE-2023-0400 https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US • CWE-427: Uncontrolled Search Path Element CWE-670: Always-Incorrect Control Flow Implementation •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 2

As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows. • http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html http://seclists.org/fulldisclosure/2023/Sep/6 https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.0EPSS: 0%CPEs: 17EXPL: 1

Windows Bluetooth Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del controlador Bluetooth de Windows • https://github.com/gmh5225/CVE-2023-21739 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21739 • CWE-591: Sensitive Data Storage in Improperly Locked Memory •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 6

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Controlador de función auxiliar de Windows para la vulnerabilidad de elevación de privilegios de WinSock • https://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit https://github.com/Malwareman007/CVE-2023-21768 https://github.com/3yujw7njai/CVE-2023-21768-POC https://github.com/xboxoneresearch/CVE-2023-21768-dotnet https://github.com/h1bAna/CVE-2023-21768 https://github.com/Ha0-Y/CVE-2023-21768 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21768 - • CWE-822: Untrusted Pointer Dereference •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 3

The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with administrative privileges. El controlador anti trampas HoYoVerse (anteriormente miHoYo) Genshin Impact mhyprot2.sys versión 1.0.0.0, no restringe apropiadamente las llamadas a funciones no privilegiadas, lo que permite a usuarios locales no privilegiados ejecutar código arbitrario con privilegios SYSTEM en sistemas Microsoft Windows. • https://github.com/kagurazakasanae/Mhyprot2DrvControl https://github.com/kkent030315/evil-mhyprot-cli https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims •